Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 管理學院企業管理專班(Global MBA)
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69722
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor曹承礎(Seng-Cho Chou)
dc.contributor.authorDaniel Tennen
dc.contributor.author唐丹尼zh_TW
dc.date.accessioned2021-06-17T03:25:14Z-
dc.date.available2018-05-31
dc.date.copyright2018-05-31
dc.date.issued2018
dc.date.submitted2018-05-23
dc.identifier.citationBarnum, S., Gegick, M., & Michael, C. (2005, September 13). Defense in Depth. Retrieved from United States Computer Emergency Readiness Team: https://www.us-cert.gov/bsi/articles/knowledge/principles/defense-in-depth
Bureau of Consular Affairs, Ministry of Foreign Affairs, Republic of China. (n.d.).Retrieved from Visa: https://www.boca.gov.tw/np-137-2.html
Daniels, J. (2017, November 8). Chinese Theft of Sensitive US Military Technology is Still a 'Huge Problem,' Says Defense Analyst. Retrieved from CNBC: https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-militarytechnology-still-huge-problem.html
Department of the Treasury, Internal Revenue Service. (2017, December 08). Tax Guide for U.S. Citizens and Resident Aliens Abroad. Publication 54.
Eubanks, N. (2017, July 13). The True Cost of Cybercrime for Businesses. Retrieved from Forbes: https://www.forbes.com/sites/theyec/2017/07/13/the-true-cost-ofcybercrime-for-businesses/#64e74d004947
Filkins, B. (2016). IT Security Spending Trends. SANS.
Gartner. (2017, December 7). Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017. Retrieved from Gartner: https://www.gartner.com/newsroom/id/3836563
Gold, M. (2013, July 19). Taiwan a 'Testing Ground' for Chinese Cyber Army. Retrieved from Reuters: https://www.reuters.com/article/uk-taiwan-cyberidUKBRE96H1BZ20130719
Grand View Research. (2018). Cyber Security Market Size, Share & Trends Analysis 2018 - 2024. San Francisco: Grand View Research.
Grimes, R. (2017, December 5). 5 Computer Security Facts That Surprise Most People. Retrieved from CSO Online: https://www.csoonline.com/article/3239644/databreach/5-computer-security-facts-that-surprise-most-people.html
International Monetary Fund. (2015, October). World Economic Outlook Database. Retrieved from International Monetary Fund: http://www.imf.org/external/pubs/ft/weo/2015/02/weodata/weoselagr.aspx
KPMG Taiwan. (2016, August). 90% of CEO Worries About Taiwan’s Cyber Security Risks. Retrieved from KPMG International: https://home.kpmg.com/tw/en/home/media/press-releases/2016/08/90--of-ceoworries-about-taiwans-cyber-security-risks.html
Krause, R. (2017, December 7). Cybersecurity Spending Seen Rising 8% Worldwide Again Next Year. Retrieved from Investor's Business Daily: https://www.investors.com/research/ibd-industry-themes/cybersecurityspending-seen-rising-8-worldwide-again-next-year/
Ku Chuan, S. H. (2018, April 5). Taiwan Addressing Cybersecurity Talent Shortage Amid China Threat . Retrieved from Focus Taiwan News Channel: http://focustaiwan.tw/search/201804050011.aspx?q=cyber
Lewis University. (2009). Lewis University. Retrieved from The History of Cyber Warfare: https://online.lewisu.edu/mscs/resources/the-history-of-cyber-warfare
Miller, G. (2016, October 23). The Denver Post. Retrieved from 60% of small companies that suffer a cyber attack are out of business within six months.: https://www.denverpost.com/2016/10/23/small-companies-cyber-attack-out-ofbusiness/
Morgan, S. (2017). 2017 Cybercrime Report. San Francisco: Cybersecurity Ventures.
Morgan, S. (2018). 2018 Cybersecurity Market Report. San Francisco: Cybersecurity Ventures.
National Information and Communication Security Taskforce. (2013). National Strategy for Cybersecurity Development Program (2013 - 2016). Taiwan Executive Yuan.
Nicastro, S. (2018, January 2). Small-Business Grants and Resources for Veterans 2018. Retrieved from Nerdwallet: https://www.nerdwallet.com/blog/smallbusiness/small-business-grants-for-veterans/
Pendse, G. (2017, January 18). Cybersecurity: Industry Report & Investment Case. Retrieved from Marketinsite:
http://business.nasdaq.com/marketinsite/2017/Cybersecurity-Industry-Report-Investment-Case.html
Perlroth, N. (2017, July 6). Hackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say. Retrieved from New York Times: https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hackreport.html
Ponemon Institute. (2018). Enpoint Security by the Numbers. Retrieved from Barkly: https://www.barkly.com/2017-endpoint-security-statisticsinfographic?hsCtaTracking=fb474b21-305a-4356-ab19-410405e3c6cd%7C3fc46c61-79a1-4035-b378-ed0e509b5452
Reuters Staff. (2017, December 12). Reuters. Retrieved from Taiwan's Far Eastern International Fined NT$8 million Over SWIFT Hacking Incident: https://www.reuters.com/article/us-far-eastern-fine/taiwans-far-easterninternational-fined-t8-million-over-swift-hacking-incident-idUSKBN1E60Y3
Rob van der Meulen, C. P. (2017, December 7). Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017. Retrieved from Gartner: https://www.gartner.com/newsroom/id/3836563
SANS Institute. (2007). Information Security Policy - A Development Guide for Large and Small Companies. Retrieved from SANS Institute Reading Room: https://www.sans.org/reading-room/whitepapers/policyissues/informationsecurity-policy-development-guide-large-small-companies-1331
Small and Medium Enterprise Association, Ministry of Economic Affairs, Republic of China. (n.d.). Incorporating in Taiwan. Retrieved from International Entrepreneur Initiative Taiwan: https://startup.sme.gov.tw
Telecommunication Development Bureau. (2017). ICT Facts and Figures. Geneva: International Telecommunications Union.
Tu, T. (2018, April 13). Cyber Security in Taiwan. (D. Tenn, Interviewer)
Turner, G. (2015, September 9). Cybersecurity Index Beats S&P 500 by 120%. Here’s Why, in Charts. Retrieved from The Wallstreet Journal: https://blogs.wsj.com/moneybeat/2015/09/09/cybersecurity-index-beats-sp-500-by-120-heres-why-in-charts/
White, E. (2017, November 13). Taiwan Boosts Cyber Defences Against Threat from China. Retrieved from The Financial Times: https://www.ft.com/content/ff7690ba-c067-11e7-b8a3-38a6e068f464
World Economic Forum. (2018). World Economic Forum (WEF) Global Risk Report. Geneva: World Economic Forum.
Yeh Su Ping, K. L. (2017, 12 12). Government to Introduce Nationwide Information Security Network. Retrieved from Focus Taiwan News Channel: http://focustaiwan.tw/news/ast/201712120027.aspx
Zadelhoff, M. V. (2016, September 19). The Biggest Cybersecurity Threats Are Inside Your Company. Retrieved from Harvard Business Review: https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-yourcompany
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69722-
dc.description.abstract本業務計劃介紹“卡斯卡迪亞安全服務”,以下簡稱到“卡斯卡迪亞”。 Cascadia是總部位於台北的網絡安全諮詢公司,台灣。卡斯卡迪亞將在台灣開展業務,但將尋求國際以滿足亞太地區網絡安全服務日益增長的需求,太平洋地區。初始服務將集中在評估,用戶培訓,網絡強化,合規審計以及針對政府機構的滲透測試作為中小型企業。中長期目標將包括事件響應,硬件和軟件銷售以及網絡保險諮詢。該以下文件將為市場進入,增長和維持提供路線圖為卡斯卡迪亞安全服務。zh_TW
dc.description.abstractThis business plan introduces “Cascadia Security Services”, hereinafter referred to as “Cascadia”. Cascadia is cyber security consulting firm headquartered in Taipei, Taiwan. Cascadia will initiate operations within Taiwan but will seek international expansion in response to a growing need for cyber security services throughout the Asia-Pacific region.
Initial service offerings will concentrate on assessment, user education, network hardening, compliance auditing, and penetration testing for government agencies as well as small and medium business enterprises. Medium to long-term goals will include incident response, hardware and software sales, and cyber insurance consulting. The following document will provide a roadmap for market entry, growth, and sustainment for Cascadia Security Services.
en
dc.description.provenanceMade available in DSpace on 2021-06-17T03:25:14Z (GMT). No. of bitstreams: 1
ntu-107-R05749032-1.pdf: 7698271 bytes, checksum: f2eb277c6d88abca2c36569bd8952372 (MD5)
Previous issue date: 2018
en
dc.description.tableofcontentsTable of Contents ......................................................................................................... 1
List of Tables and Figures ............................................................................................ 3
1. Executive Summary ...................................................................................... 4
1.1 Objectives ..................................................................................................... 4
1.2 Mission ......................................................................................................... 4
1.3 Market Need ................................................................................................. 4
1.4 Keys to Success ............................................................................................ 8
2. Business Overview ........................................................................................ 9
2.1 Company Ownership ..................................................................................... 9
2.2 Legal Considerations ..................................................................................... 9
2.3 Locations and Facilities ............................................................................... 10
3. Services ...................................................................................................... 12
3.1 Service Descriptions.................................................................................... 13
3.2 Fulfillment .................................................................................................. 15
4. Marketing Management .............................................................................. 18
4.1 Industry Analysis ........................................................................................ 18
4.2 Country Analysis ........................................................................................ 20
4.3 Market Forces ............................................................................................. 23
4.4 Competitor Analysis.................................................................................... 26
4.5 Segmentation, Targeting, and Positioning ................................................... 27
4.6 Marketing Strategies ................................................................................... 28
4.7 Branding ..................................................................................................... 31
5. Strategy and Execution ................................................................................ 32
5.1 Value Proposition ........................................................................................ 32
5.2 Core Competencies ..................................................................................... 32
5.3 SWOT Analysis .......................................................................................... 33
5.4 Pricing Strategy........................................................................................... 36
5.5 Strategic Alliances ...................................................................................... 37
2
5.6 Expansion and Milestones ........................................................................... 39
5.7 Human Resources ....................................................................................... 40
6. Entry Strategy ............................................................................................. 44
6.1 Startup Expenses ......................................................................................... 44
6.2 Initial Funding ............................................................................................ 44
6.3 Talent Recruitment ...................................................................................... 45
6.4 Business Development ................................................................................ 46
7. Exit Strategy ............................................................................................... 47
7.1 Liquidate and Dissolve ................................................................................ 47
7.2 Buy Out or Merger ...................................................................................... 47
7.3 Relinquish Management Role...................................................................... 48
8. Financial Planning....................................................................................... 49
8.1 Assumptions ............................................................................................... 49
8.2 Key Financial Indicators ............................................................................. 49
8.3 Projected Income Statement ........................................................................ 50
8.4 Projected Cash Flow ................................................................................... 51
9. Risk Management ....................................................................................... 52
10. References .................................................................................................. 54
dc.language.isoen
dc.subject互聯網zh_TW
dc.subject網絡zh_TW
dc.subject安全zh_TW
dc.subject信息zh_TW
dc.subject諮詢zh_TW
dc.subject商業zh_TW
dc.subject計劃zh_TW
dc.subjectsecurityen
dc.subjectplanen
dc.subjectbusinessen
dc.subjectconsultingen
dc.subjectinformationen
dc.subjectcyberen
dc.subjectinterneten
dc.titleCascadia 資安服務-設立於台灣的網路安全顧問公司zh_TW
dc.titleCascadia Security Services – A Taiwan-based Cyber Security Consulting Businessen
dc.typeThesis
dc.date.schoolyear106-2
dc.description.degree碩士
dc.contributor.oralexamcommittee孔令傑(Ling-Chieh Kung),陳建錦(Chien-Chin Chen)
dc.subject.keyword網絡,安全,信息,諮詢,商業,計劃,互聯網,zh_TW
dc.subject.keywordcyber,security,information,consulting,business,plan,internet,en
dc.relation.page56
dc.identifier.doi10.6342/NTU201800821
dc.rights.note有償授權
dc.date.accepted2018-05-23
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept企業管理碩士專班zh_TW
顯示於系所單位:管理學院企業管理專班(Global MBA)

文件中的檔案:
檔案 大小格式 
ntu-107-1.pdf
  未授權公開取用
7.52 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved